Method and system to provide security implementation for storage devices

a storage device and security technology, applied in the field of security in portable digital devices, can solve problems such as avoiding data loss

Inactive Publication Date: 2008-05-15
MCM PORTFOLIO LLC
View PDF92 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005]In one embodiment, method that can be performed on a system, is provided to security implementations for storage devices. In one embodiment, the method comprises providing a separate encryption seed for each of a plurality of separate addressable blocks of a non-volatile storage device, wherein a common encryption method is to encrypt data to be stored on the plurality of separate addressable blocks. In one embodiment, the storage device is a portable storage device. In

Problems solved by technology

Once the moving is complete, it would then mark th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system to provide security implementation for storage devices
  • Method and system to provide security implementation for storage devices
  • Method and system to provide security implementation for storage devices

Examples

Experimental program
Comparison scheme
Effect test

example implementation

[0039]The product would be shipped as CD+Public, meaning the storage device, when connected to a PC, would provide a CD icon and a storage icon in the My Computer window, by pretending to the operating system of the host to be or to contain a CD drive. In the CD portion, there would be an application resident to make the device “Secured”. When launched, the program prompts the user for a password and then encrypts the secure partition with the master key and IV, as described above.

[0040]One method to generate a 32-bit random number in a USB storage system is to use the USB frame number (a random number that is generated by the USB host, such as a PC, every millisecond) and an internal counter in the controller that is incremented every system clock and that has a random starting value that cannot be predicted, as previously discussed in the description of FIG. 1.

[0041]FIG. 7 shows a block diagram of such an exemplary asynchronous random generator 700, using both a frame number 701 a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In one embodiment, method that can be performed on a system, is provided to security implementations for storage devices. In one embodiment, the method comprises providing a separate encryption seed for each of a plurality of separate addressable blocks of a non-volatile storage device, wherein a common encryption method is to encrypt data to be stored on the plurality of separate addressable blocks. In one embodiment, the storage device is a portable storage device. In one embodiment, encryption seed is an Initialization Vector (IV). In one embodiment, the encryption seeds comprise at least one of a media serial number and a logical block address corresponding to the respective block of the non-volatile storage device. In an alternative embodiment, the method further comprises storing at least a part of the separate encryption seed of the separate blocks of the non-volatile storage device within the respective blocks of the storage device.

Description

FIELD OF INVENTION[0001]This invention relates to security in portable digital devices such as flash memory cards or rotating magnetic disks.BACKGROUND OF THE INVENTION[0002]Portable digital storage devices are becoming increasing popular. These devices include solid-state storage such as flash memories and traditional hard disks. This popularity extends to the leading flash media, such as CompactFlash, Secure Digital Card, Memory Stick PRO, MultiMediaCard, Flash Drives, and their electrical variants. These devices can easily store gigabytes of data, weigh a few ounces, and be no bigger than a credit card. The problem with these devices is they are easily lost. Many people today carry large amounts of vital data on devices, which they keep in their pockets. It is very important that this data be encrypted to ensure that only the owner can read it.[0003]There are many encryption schemes, but the Advanced Encryption Standard (AES) is quickly being adopted as the industry standard.[000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14H04L9/28
CPCG06F12/1408G06F21/79G06F2221/2107G11B2220/60G11B20/00115G11B20/00152G11B20/0021G11B20/00086G06F12/06G06F12/14G06F21/00
Inventor IYER, SREE MAMBAKKAMJONES, LARRY LAWSONVENKIDU, AROCKIYASWAMYKUMAR, SANTOSH
Owner MCM PORTFOLIO LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products